Technical Analysis & Remediation
MITRE ATT&CK Mapping
T1566.002
(Phishing: Spearphishing Link)
T1219
(Remote Access Software)
CVE Profile
N/A [CISA KEV Status: Inactive]
(This attack relies on social engineering and the abuse of legitimate software, rather than exploiting a specific CVE).
Telemetry
File Names
"Social_security_statements_2025.pdf"
Tooling
"Datto RMM"
Constraint
The structure suggests the payload at the link destination is an executable, script, or shortcut disguised as a document, as clicking a legitimate PDF would not natively install RMM software without an unmentioned browser exploit.
Remediation - THE ENTERPRISE TRACK (NIST SP 800-61r3 / CSF 2.0)
GOVERN (GV) – Crisis Management & Oversight
Command
Issue immediate security awareness communications regarding SSA-themed tax season phishing.
DETECT (DE) – Monitoring & Analysis
Command
Query EDR and SIEM for unexpected installations, service creations, or network connections related to "Datto RMM" across endpoints that are not authorized to run it.
Command
Hunt email gateways for subject lines containing "Important Disclosures" or "Important Regulatory Information" where the sender domain does not end in .gov.
RESPOND (RS) – Mitigation & Containment
Command
Isolate any endpoint identified with an unauthorized Datto RMM installation.
RECOVER (RC) – Restoration & Trust
Command
Validate the complete removal of the RMM tool and verify no secondary persistence mechanisms (e.g., newly created local admin accounts) were established before returning the host to the network.
IDENTIFY & PROTECT (ID/PR) – The Feedback Loop
Command
Implement Application Control (e.g., WDAC/AppLocker) policies to explicitly block unauthorized RMM software certificates.
Remediation - THE HOME USER TRACK (Safety Focus)
Priority 1: Safety
Command
Disconnect from the internet immediately if you clicked the link and installed the software. Datto RMM provides attackers with real-time interactive access to your machine.
Command
Do not log into banking/email until verified clean.
Priority 2: Identity
Command
Reset passwords/MFA using a known clean device (e.g., phone on 5G).
Priority 3: Persistence
Command
Check Installed Programs, Scheduled Tasks, and Startup Folders for "Datto RMM" or any unrecognized remote desktop software. If found, uninstall it immediately and run a full offline antivirus scan.
Hardening & References
Baseline
CIS Benchmarks (Application Whitelisting / Software Restriction Policies).
Framework
NIST CSF 2.0 / SP 800-61r3.
Note
Because this attack abuses legitimate software, traditional signature-based Antivirus may not flag the Datto RMM binary itself. Behavioral monitoring and strict execution controls are required to stop Living-off-the-Land (LotL) techniques.
Source
HackRead Article